Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Networking, Architecture & Security Systems Group modules Level 2.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Security Certification
Computer and Information Technology Core courses focus on problem solving and communication skills for Information Technology professionals involved in.
Course 1562B: Designing a Microsoft ® Windows ® 2000 Networking Services Infrastructure.
The Road to the Microsoft MCITP Certifications and Other Topics Networking Curriculum.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Network Administration. What is a Systems Administrator?  Person responsible for:  Setting up servers  Configuring the environment for web and other.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Information Systems Security Operations Security Domain #9.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Note1 (Admi1) Overview of administering security.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Course 2277: Implementing, Managing, and Maintaining a Microsoft ® Windows ® Server 2003 Network Infrastructure: Network Services.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Agriculture Class Offerings
CS457 Introduction to Information Security Systems
Chapter 1 Introduction to Networking
Networking, Architecture & Security Systems Group modules
Security Criteria, Certifications, and Training
CNT 4704 Computer Communication Networking (not “analysis”)
Networking, Architecture & Security Systems Group modules
Dumps PDF Check Point Certified Security Administrator – GAiA dumps.html Dumps Checkpoint.
An Overview of the ITTC Networking & Distributed Systems Laboratory
Security Securing IS.
IS4550 Security Policies and Implementation
Dumps PDF Check Point Certified Security Administrator – GAiA dumps.html Dumps Checkpoint.
CMGT 245 Possible Is Everything/snaptutorial.com
CMGT 245 Education for Service-- snaptutorial.com.
Information Technology
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
U.S. Education Implementation Examples
برنامج أمن أنظمة الحاسب
U.S. Education Implementation Examples
Networking for Home and Small Businesses – Chapter 8
Information Assurance & Network Security Certificate
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications & Information Technology IT+

Topics Need for state-of-the-art certifiable skills IT+ laboratory facilities and resources Telecommunications lab Operating systems lab Network security lab design Curriculum and topics covered in the Graduate Network Security Certificate Masters degree program in Telecommunications A Center for the Development and Investigation in Information Assurance and Network Security Project Summary

Need for state-of-the-art education & skills The network is the backbone of the modern enterprise The network is vulnerable to a wide variety of security threats Traditional engineering, science and administration Information Systems programs do not deliver in-depth knowledge and skills There is a need to insure that the skills of those in charge of this vital resource are capable of handling security threats and issues.

Telecommunications Lab.

Operating Systems & Telecommunications Labs

Network Security Investigation Configuration

Network Security Certificate Program Overview One Year Program – 4 trimesters 2 classes per trimester (Conference & Lab)  Introduction to Network Security Problems and Principles  Firewalls, Perimeter Protection and VPN´s  Intrusion Detection  Hacker Techniques, Exploits, and Incident Handling  Security in the Windows Environment  Security in the Unix and Linux Environments  Auditing Networks, Procedures and Systems  System Forensics, Investigation and Response

Network Security Core Topics Public and Private Key Cryptography Remote Access Security Virtual Private Networks and IP Security X.509 Certificates Kerberos Key Management Hardware and Software Firewalls Security Planning and Auditing Network Address Translation Immunization and Recovery from Viruses Password Administration Securing Shared Resources

Network Security Benefits Cycle

Focus on Innovation Network Security Technologies Human Resources Development Educational – 1 Year Certificate Program Future Software & Hardware products certifications

Masters of Science in Telecommunications & Networks Systems Administration Core & Specialization Courses (36/45 Credits) Core Courses (17 credits) TCOM507Convergence of Technologies4 credits TCOM506IP Telephony4 credits TCOM505Design and Implementation of Voice Networks4 credits TCOM504Network Analysis and Design4 credits MAIS704Information Technology: Management and Policy3 credits Specialization Courses (19 credits) TCOM501Introduction to Networking3 credits TCOM502Introduction to Local and Wide Area Networks4 credits TCOM503Introduction to TCP/IP4 credits MANA708Information Technology: Project Management3 credits TCOM510Probability and Stochastic Processes for Science and Engineering 3 credits

Network Security Project Summary First steps towards the creation of a unique center for investigation and human resources development in the area of Networking Security Certificate in network security Option in Electrical Engineering Graduate specialized courses Leverages off our existing graduate program in Telecommunications Excellent commercialization potential through Research that could yield new techniques and protocols Possible software product based upon new algorithms Licensing agreements